AUTHORIZED REMOTE ACCESS TO AN OPERATING SYSTEM HOSTED BY A VIRTUAL MACHINE
First Claim
1. A method for providing authorized remote access to initial program load, IPL, an operating system hosted by a virtual machine, VM, the method comprising:
- receiving, at a client system, a request for an IPL of an operating system hosted by a VM, the VM being provided by a server system;
generating, at the client system, a first authentication token and a shut-down instruction for shutting down the operating system;
communicating the first authentication token and the shut-down instruction to the server system;
at the server system, verifying that the first authentication token is valid and, if valid, executing the shut-down instruction on the server system to shut-down the operating system;
generating, at the client system, a second authentication token and an IPL instruction for the operating system;
communicating the second authentication token and the IPL instruction to the server; and
at the server system, verifying that the second authentication token is valid and, if valid, executing the IPL instruction on the server to re-start the operating system.
6 Assignments
0 Petitions
Accused Products
Abstract
Proposed is a concept for providing authorized remote access to an operating system hosted by a virtual machine. first and second authentication tokens are generated at a client system and communication to a server system providing the virtual machine. the validity of the first and second authentication tokens is verified at the server system. if the validity of the first authentication token is verified, the operating system is shut-down. then, if the validity of the second authentication token is verified, the operating system is re-started.
-
Citations
15 Claims
-
1. A method for providing authorized remote access to initial program load, IPL, an operating system hosted by a virtual machine, VM, the method comprising:
-
receiving, at a client system, a request for an IPL of an operating system hosted by a VM, the VM being provided by a server system; generating, at the client system, a first authentication token and a shut-down instruction for shutting down the operating system; communicating the first authentication token and the shut-down instruction to the server system; at the server system, verifying that the first authentication token is valid and, if valid, executing the shut-down instruction on the server system to shut-down the operating system; generating, at the client system, a second authentication token and an IPL instruction for the operating system; communicating the second authentication token and the IPL instruction to the server; and at the server system, verifying that the second authentication token is valid and, if valid, executing the IPL instruction on the server to re-start the operating system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A client system for providing authorized remote access to an operating system hosted by a VM of a server system, the client system comprising:
-
IPL request unit adapted to receive a request for an IPL of an operating system hosted by the VM, to generate a first authentication token and a shut-down instruction for shutting down the operating system, and to generate a second authentication token and an IPL instruction for re-starting the operating system; and a communication interface adapted to communicate the first authentication token and the shut-down instruction to the server system, and to communicate the second authentication token and the IPL instruction to the server. - View Dependent Claims (10, 11, 12)
-
-
13. A server system for providing authorized remote access to an operating system hosted by a VM of the server system, the client system comprising:
-
a communication interface adapted to receive, from a client system, a first authentication token and a shut-down instruction for shutting down the operating system, and to receive, from the client system, a second authentication token and an IPL instruction for re-starting the operating system; a verification unit adapted to verify that the first authentication token is valid and to verify that the second authentication token is valid; and a processor adapted to execute the shut-down instruction on the server system to shut-down the operating system if the verification unit verifies that the first authentication token is valid, and to execute the IPL instruction to re-start the operating system if the verification unit verifies that the second authentication token is valid. - View Dependent Claims (14, 15)
-
Specification